“What is it? In a nutshell, it’s replacing the traditional 512 byte hard drive sector with a 4 kilobyte (4,096B) hard drive sector for a number of practical and technological reasons. The move to 4K-sectors has been some 10 years … Read more
surfandwork
Experimental Validation Tool For Cell Phone Forensics Developed
Viewers of TV dramas don’t focus on the technology behind how a forensics crime team tracks a terrorist or drug ring using cell phone data, but scientists at the National Institute of Standards and Technology (NIST) do. NIST researchers have … Read more
His Facebook Status Now? ‘Charges Dropped’
Where’s my pancakes, read Rodney Bradford’s Facebook page, in a message typed on Saturday, Oct. 17, at 11:49 a.m., from a computer in his father’s apartment in Harlem. At the time, the sentence, written in indecipherable street slang, was just … Read more
Microsoft Make Digital Forensics Tool Available to Law Enforcement
At the Digital Crimes Consortium, Microsoft Corp. and the National White Collar Crime Center (NW3C) announced an agreement establishing NW3C as the first U.S.-based distributor of the Computer Online Forensic Evidence Extractor (COFEE). A Microsoft-developed program, COFEE uses digital forensic … Read more
Court of Appeals ruling limits electronic searches
A federal appeals court this week ruled that government investigators cannot retain incriminating information found in electronic searches unless it is within the scope of a search warrant…
iPhone Forensics Webcasts
iPhone Forensics Demonstration:
http://www.youtube.com/watch?v=op-HyBVN2Ek
iPhone Forensics 101: Bypassing the iPhone Passcode
Digital Forensics: The Chance to Play Detective
After Hurricane Katrina devastated much of Louisiana, the state was granted $9 billion for recovery and disbursement to individual homeowners. Keith Barger, a director in KPMG’s Forensic practice in Houston, was put in charge of a forensics and fraud team … Read more
State of Mac data forensics
As Apple’s computers and mobile devices become increasingly popular, they sometimes get used by criminals. But with their current hardware and new software tools from Blackbag Technology and SubRosaSoft, Macs are also becoming the tools of choice for forensics examiners…… Read more
Mac for Computer Forensics & e-discovery
While most computer users have good intentions, a small minority do not. Law enforcement and security-focused IT professionals need flexible, powerful tools for examining the computers of those suspected of wrongdoing. You’ll hear a panel of distinguished experts, with over … Read more
Cracking the case: ‘DOMEX’ system is tool used to analyze crime
When Baltimore authorities seized computers connected to a multimillion-dollar Internet pharmacy operation in late 2006, they turned to Johnstown for help. Specialists at the National Drug Intelligence Center analyzed large amounts of electronic information, providing crucial evidence that led to … Read more
Forensics with dd
http://www.informit.com/articles/article.aspx?p=27203&seqNum=3
This chapter is from the book SANS GIAC Certification: Security Essentials Toolkit (GSEC)
Step-by-step instruction on how to image a hard drive with Linux’s dd program.… Read more
Google searches lead to murder conviction
5th Circuit Appeal court upheld a murder conviction based on Google searches and a suggestive Guns N’ Roses song he downloaded. He appealed on grounds that the evidence was wholly circumstantial and insufficient for conviction. A Florida state appeals court … Read more
Damaged DVD Recovery and Forensics
“My friend, Xenon, recently pointed me to an article on digitial forensics. According to the report, the conviction of the accused was dependent on the recorded testimony of one of the victims. Unfortunately, the recording was saved on a DVD, … Read more
The Hash Algorithm Dilemma – Hash Value Collisions
Recently, research and news has created a great deal of discussion about hash algorithms and their validity for forensic uses. Over the past several years, the primary hash algorithm used in forensic applications, MD5, has been compromised for use in … Read more